APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

Size: px
Start display at page:

Download "APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS"

Transcription

1 APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS The requirements of these Oracle Global Supply Chain and High Value Asset Physical Security Standards apply to all geographical areas. APPLICATION The successful implementation of the Oracle Supply Chain and High Value Asset Physical Security Standards in this Appendix is dependent upon Supplier and Oracle working in partnership. However, primary responsibility for the safety and security of Oracle assets lies with Supplier. Supplier must ensure that all affiliated companies and subcontractors utilized by the Supplier also comply with these security Standards. B. WAIVERS Exception(s) to any of the physical security requirements in this Appendix require a written waiver from Oracle GPS. To request a waiver, Supplier must submit a written application, including a description of alternative physical security measures that Supplier has or will implement. Oracle GPS will assess whether the alternative physical measures proposed by Supplier are acceptable. If a waiver is granted, it will be effective for no more than one year from the date of issuance, and may be terminated at any time by Oracle should there be a change in Oracle business needs or the security risks or it is found that the Supplier has not adequately implemented and maintained the alternate security measure proposed in the waiver request. A waiver will be effective only for the individual shipments or specific routes and facilities described in the waiver. C. FACILITY CLASSIFICATION Security requirements vary depending on the facility category as follows: Category A- Storage/Handling of HVP for periods in excess of 12 hrs. Examples of the type of facility to which this classification applies are: Warehousing of HVP in excess of 12 hrs Repair Vendors-Handling HVP in excess of 12 hrs Re-manufacture Facilities-Handling HVP in excess of 12 hrs Category B- Storage/Handling of HVP for periods less than 12 hrs. Examples of the type of facility to which this classification applies are: Warehousing of HVP for less than 12 hrs Traditional logistic cross dock operation- (Asset delivered on one vehicle and cross docked onto another vehicle within hours-no storage) Repair Vendors-Handling HVP for less than 12 hrs Re-manufacture Facilities-Handling HVP for less than 12 hrs

2 Category C- Storage/Handling of all other assets for periods in excess of 12 hrs. No HVP to be stored/handled in these facilities. Examples of the type of facility to which this classification applies are: Warehousing of non High Value Assets in excess of 12 hrs Oracle Services Spare Part Storage Facilities in excess of 12 hrs. Non High Value Global Stocking Locations in excess of 12 hrs. Non high Value Repair Vendors/Re-manufacture facilities in excess of 12 hrs. Category D- Storage/Handling of all other assets for periods less than 12 hrs. No HVP to be stored/handled in these facilities. Examples of the type of facility to which this classification applies are: Warehousing non High Value Assets for less than 12 hrs Traditional logistic cross dock operation of non High Value Assets- (Asset delivered on one vehicle and cross docked onto another vehicle within hours-no storage) D. PHYSICAL SECURITY STANDARDS BY FACILITY CATEGORY The following matrix summarizes the physical security Standards for each category of facility. More detailed information follows the matrix. MINIMUM SECURITY PROTECTION LEVEL MATRIX Category Security Standard A B C D Remarks Facility Security 1.1 Enclosed Building structure 1.2 Fencing/Gating * * * 1.3 Exterior Lighting /7 on site Security * 1.5 Security Check Calls * 1.6 Security Officer procedures * 1.7 Duress/Panic Alarms 1.8 Landscaping/ unobstructed view of the facility. 1.9 All openings that might permit entry, including dock doors, closed and secured when not in use Window coverage in storage area 1.11 Access Control System

3 Category 1.12 Restricted Facility Access 1.13 Photographic Employee Badging Process 1.14 Visitor Badging/escort process 1.15 Intrusion Alarm System 1.16 Alarm Response Category A should have 24/7 on site security. However, back up procedures should be in place in the event the on site security is unable to respond due to hostage/illness/inju ry or other event Alarm transmission cellular backup 1.18 CCTV System 1.19 Back up Power for Alarms and CCTV 1.20 Security Technology regularly tested 1.21 High Value area with access * * control/alarm/cctv 1.22 Non-High Value stored so as to prevent cross contamination with other customers Outgoing trash inspected Risk Management Fire Safety 1.24 Fire Alarm System 1.25 Automatic Sprinkler system * * To include Services spare part facility categorised as Tier Hot work and control of ignition sources Vehicle Security 2.1 Container Integrity 2.2 Trailer Integrity

4 Category 2.3 Hard bodied vehicles 2.4 Driver stops in designated areas 2.5 Vehicle immobilisation system 2.6 Communication System 2.7 Pre-Alert-High Value Product * * 2.8 Advance notice of vehicle and driver ID checks before departure with assets 2.9 No pre-loading of trailers. Loading done in presence of driver 2.10 Oracle freight only to be opened by Oracle or Customs Officials 2.11 Containers sealed and locked. Seal records retained for 30 days Handling Security 3.1 Handling process sufficient to detect shortages/pilferage etc 3.2 Positive verification of shipment integrity at all points of hand off. 3.3 Losses reported to Oracle within 24 hrs Personnel Security 4.1 Vetting Process/HR Hiring Policy 4.2 Employee Training 4.3 Driver Training Below are detailed security requirements which should be used in conjunction with the matrix. Supplier Facility Security: 1.1 The Service provider and/or the sub-contractor is required to provide a secure storage area for Oracle's assets. An enclosed building structure will be used which is designed to deter and prevent unauthorized access. 1.2 Fenced facility boundaries, with a perimeter gate or other barrier system that prevents unauthorized access. Access to this area is only granted after identity and proper

5 authorization are verified. As a minimum the fenced/gated area should encompass the dock area. 1.3 Lighting sufficient to illuminate surrounding property grounds will be provided hour on-site guarding of facility will be provided. 1.5 Where on-site guarding is provided, regular check calls between officer(s) on site and their main control centre will be performed. 1.6 Procedures to be in place for action for Security Officer to take in the event of an incident. 1.7 Duress/panic alarms for use by lone workers or on site security. Alarms should be linked to alarm response/law enforcement. 1.8 Landscaping that allows for direct, unobstructed view of the facility from the street and from neighbouring facilities will be maintained. 1.9 All openings that might permit entry, including dock doors, will be closed and secured when not in use Windows in storage areas will be screened with a suitable material to prevent showcasing of assets from outside the building An access control system will be utilised. The system must monitor all openings that might permit entry and be able to track events historically by identity and time of entry/exit. Ideally the system will be an electronic access control system. However, where this is not employed the full processes and procedures for the system in use will be provided to Oracle GPS for review and approval Restricted access into the facility that permits entry only to those given prior authorization to access the facility will be rigidly enforced. This should be in conjunction with any access control system Employee badges are required. A badging process that identifies employees whilst in the facility will be utilised at all times. The badge should include an image of the employee (Photo ID) 1.14 Badges for all visitors are required. All visitors must be escorted within the facility A security intrusion alarm system that covers external doors, including dock doors, into the facility; perimeter openings like skylights; and internal perimeter doors leading to areas storing high value product will be employed. The system will also monitor all vulnerable glass areas and provide an alarm in the event of breakage. Burglar bars or other such physical prevention measure can also be utilized Real-time alarm monitoring and response to the installed security intrusion alarm system will be provided by an alarm response company or a law enforcement agency.

6 Employees should not be utilised as on call first responders to alarm activations out of hours Cellular or similar backup for alarm transmission is required for the facility A closed circuit television (CCTV) system with coverage sufficient to the capture images of all facility perimeter entry points (doors/windows/skylights etc). The Oracle storage area will be under CCTV coverage to capture all Oracle assets in the facility at all times. The CCTV system will record activity 24hrs/7day. Where a motion detection system is used it is acceptable for images only to be recorded when movement is detected. Images will be retained for a minimum of 30 days. Where a digital system is not used an individual will be designated as primarily responsible for tape rotation. In circumstances where country Data Protection Laws preclude the retention of images for 30 days or longer, then the local laws will have supremacy. All recording equipment and tapes will be secured in a secure room to which access is restricted to those responsible for CCTV operation Backup power to support the security alarm system and the CCTV system in the event of AC power disruption will be provided. This can be UPS/generator/battery etc. The back up power supply must last for at least 8 hours. If power is not restored within 8 hrs then alternate security measures, such as on site guarding, must be put in place where this is not already in place All technical security measures; CCTV/Access Control/Alarms will be subjected to regular testing and maintenance where necessary. At least monthly checks of those systems will be performed High Value Product will be stored in a distinct security storage area. For the purpose of this action, examples of security storage may include sealed or locked containers, locked cages, locked hard-wall areas. The High Value area will have an auditable access control system, CCTV and alarms together with the associated back up requirements for the facility systems as a whole Non High Value Product will be stored in a distinct area to prevent cross contamination with other customer product stored at the facility Outgoing trash will be examined to deter pilferage. Risk Management Facility Fire Safety Requirements: The following facility safety standards are required by Oracle Risk Management Department. Any queries by service providers regarding these requirements can be directed to Oracle GPS who will liaise with Oracle Risk Management on the service provider's behalf A fire alarm system will be maintained throughout the area to protect Oracle product. This should send an alarm to a constantly staffed location with staff who are trained to promptly summon the fire department in the event of an alarm.

7 1.25 Service Providers will maintain Oracle product in a facility fully provided with automatic fire sprinklers, which will be in good working order at all times. The sprinkler control valves should be maintained in the open and locked position. Service Providers agree to inspecting the sprinkler control valves using a recorded valve inspection system on a monthly basis Hot Work and Control of Ignition Sources: Service Providers agree to control ignition sources to prevent a fire exposure to Oracle product. Hot Work is defined as any operation involving open flames or producing heat or sparks. Examples of Hot Work would be cutting, welding, brazing or soldering. Vehicle Security/Assets in Transit. 2.1 Container integrity. Prior to stuffing containers will be inspected to verify the physical integrity of the container structure through a seven point inspection.(inspection of :Front Wall, Left side, Right side, Floor, Ceiling/Roof, Inside/outside doors, Outside / Undercarriage) 2.2 Trailer integrity. Prior to stuffing trailers will be inspected to verify the physical integrity of the trailer structure through a five point inspection. (Inspection of :Fifth wheel area - check natural compartment/skid plate, Exterior front/sides, Rear bumper/doors, Front Wall, Left side) 2.3 Hard-walled, locked vehicles will be employed during transit for all shipments. 2.4 Drivers shall not deviate from the assigned delivery routes nor make unscheduled stops. Any stops necessary due to local laws regarding driver hours/rest periods will ideally be conducted in secure parking areas. In locations where this is not possible, stops will only be conducted in well lit recognised stopping areas such as service areas/refuelling stations which are open for business. Stopping in road side lay-bys, closed service areas/refuelling stations or any other isolated location is prohibited. 2.5 Vehicle immobilization devices will be in place and used when vehicle is stopped and unattended for during driver stops required by local laws or any other reason. 2.6 All Service provider's, and/or the sub-contractor's vehicles used for carrying Oracle assets shall be equipped with a suitable communication system that will allow the vehicle driver to request assistance in the event of an emergency. Routes of the supplier should be analysed with the possibility of dead spots (for cellular/radio coverage). On a case by case merit, Oracle reserves the right to require, at any time, that the Service provider's and/or the sub-contractor's vehicle tractor units and trailers be fitted with a mutually agreed vehicle location system. Global Positioning System (GPS) is a common term for some type of positioning system. The most common use in freight is a Satellite Tracking System (STS), wherein a vehicle is immediately located by satellite positioning. Where this system is required by Oracle, arrangements must be made to supply Oracle with copies of alarm exception reports when applicable. 2.7 There will be a Pre-Alert for all shipments of HVP alerting both ends as to product, method and route of delivery, and estimated time of delivery. The delivery should be

8 verified by recipient to shipper. 2.8 There will be advance notification of driver and vehicle details prior to collection of assets from a warehousing/staging facility. Prior to handing over assets to drivers, checks will be completed on driver's identity via photographic ID to ensure they are the same as the advance notification. 2.9 Loading of Oracle shipments must be done in the presence of the authorized driver, no pre-loading of product shipments on vehicles/trailers for later collection is permitted The Service provider and/or the sub-contractor is prohibited from opening sealed packages/boxes etc, unless directed by Customs officials or Oracle. Any freight showing evidence of being opened or tampered with must be reported to Oracle immediately and a written report is to be produced within twenty-four (24) hours following the discovery. The Service provider must implement procedures for communicating freight discrepancies and damaged cartons to Oracle Procedures must be in place to make sure that no unauthorized persons or materials enter into ocean containers stored or loaded at any facility. At the point of loading/stuffing, all ocean containers loaded with goods must be properly sealed. Seals used on all ocean containers bound for the U.S. must meet or exceed the International Standards Organization s Publicly Available Specification standard for high-security seals. All full (dedicated) trucks and trailers carrying goods from one location to another must be sealed with a tamper-evident seal. Seal numbers must be documented on the truck bill of lading or other applicable transport document. Unsealing/Unloading; When transferring or unloading an ocean container, the seal condition and seal number must be verified against documentation at pick-up and/or prior to unsealing/unloading. Records of all seals shall be retained for a minimum of 30 days. Shipment discrepancies must be reported to Oracle and the relevant law enforcement agency as is applicable reported as soon as possible. The term discrepancy includes pickups or deliveries that differ in piece count, size, or scope from what was expected, and all instances of compromised seal integrity (for example, broken seals, tampered seals, different seal numbers, etc.). Handling Security 3.1 Handling processes sufficient to detect shortage or loss through random procedures will be employed. Procedures will include weighing shipments on calibrated scales, box/cycle counts, signature and time/date requirements at transfer points, proof of inspection by receiver, seal inspection, or sufficient overboxing or wrapping to ensure the integrity of the skid or package. 3.2 At any and every point of cargo hand-off, whether to internal personnel (i.e., truck to distribution center) or subcontractors/agents (i.e., truck to airport), a positive verification of shipment integrity shall occur. Methods can include weight verification, piece count, or other means, but shall include a physical inspection of the freight for damage/pilferage, and hand-over will be recorded by name/agency/signature. These records shall be retained for no less than 30 days, and will be made available to Oracle.

9 3.3 Any losses/shortages identified will be reported to Oracle immediately where possible, but no later than 24 hrs. Oracle GPS to have open access to Service provider's and/or the sub-contractor's facility audits and loss/theft investigations involving Oracle losses/thefts. Also, Oracle GPS shall, as necessary, participate with service provider security on investigations and resolutions of issues involving loss/theft investigations. The appropriate law enforcement agency(s) will be notified accordingly. Personnel Security 4.1 The Service provider shall ensure that all employees and sub-contractors including drivers who have access to Oracle assets are favourably vetted before employment commences. Evidence of vetting procedures to be produced at Oracle's request together with the service provider's human resources hiring policy. Compliance with this section will be governed by existing local laws and regulations. 4.2 All employees will be given training in security vulnerabilities, individual reporting responsibilities, immediate actions to be taken in the event of any security related incident such as robbery or facility take over and internal reporting procedures where theft/pilferage is suspected. 4.3 In addition to above, drivers should be provided robbery and hijacking response training, including what the driver should do in the event of robbery/hijacking while in transit. Training should include the use of any immobilization devices. Oracle Physical Security Point of Contact:

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen

More information

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Partners in Protection / C-TPAT Supply Chain Security Questionnaire Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

Customs & Trade Partnership Against Terrorism (C TPAT)

Customs & Trade Partnership Against Terrorism (C TPAT) Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Trucker) Please answer the following questions about your company s cargo security processes and participation

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Since its inception, the Customs-Trade Partnership Against Terrorism (C-TPAT) program

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Security Profile. Business Partner Requirements, Security Procedures (Updated) Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt. TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT

More information

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas

More information

C-TPAT Security Criteria Sea Carriers

C-TPAT Security Criteria Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority. Due to the attacks

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

Best Practices For. Supply Chain Security

Best Practices For. Supply Chain Security Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers

More information

C-TPAT Highway Carrier Security Criteria

C-TPAT Highway Carrier Security Criteria C-TPAT Highway Carrier Security Criteria The supply chain for highway carriers for C-TPAT purposes is defined from point of origin from the yard or where the tractors and trailers are stored, through pickup

More information

What is C-TPAT? Customs Trade Partnership Against Terrorism

What is C-TPAT? Customs Trade Partnership Against Terrorism Learning Objectives What is C-TPAT? Terrorist Awareness Supply Chain Security Container Security Program 7 Point Inspection Seal Program Locks, Keys & Access Control / Visitor Controls Pre-Employment Verifications

More information

SECURITY IN TRUCKING

SECURITY IN TRUCKING SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada

More information

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012 Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012 This template is a tool that was developed In order to assist manufacturer clients with the application

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers CVS Pharmacy C-TPAT Requirements For Import Product Suppliers To Our Import Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

CVS Pharmacy C-TPAT Requirements For Product Suppliers

CVS Pharmacy C-TPAT Requirements For Product Suppliers CVS Pharmacy C-TPAT Requirements For Product Suppliers To Our Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with Customs-Trade

More information

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants Food Defense Self-Assessment Checklist for Slaughter and Processing Plants Outside Security 1. What food defense measures does your plant have in place for the exterior of the building? Are the plant s

More information

C-TPAT Customs Trade Partnership Against Terrorism

C-TPAT Customs Trade Partnership Against Terrorism Food and Agriculture Border Gateway Summit C-TPAT Customs Trade Partnership Against Terrorism Robert Gaydo, Senior Trade Advisor A.N. DERINGER, INC. Feb. 20, 1014 Who can participate? Air/Rail/Sea Carriers

More information

Court Security Guidelines

Court Security Guidelines July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative

More information

FSR2014 FACILITY SECURITY REQUIREMENTS. Transported Asset Protection Association. All Rights Reserved

FSR2014 FACILITY SECURITY REQUIREMENTS. Transported Asset Protection Association. All Rights Reserved FSR2014 FACILITY SECURITY REQUIREMENTS About TAPA Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics service providers. The

More information

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core

More information

Contents. Global Security Verification (GSV) Standard. Introduction... 2. The Global Security Verification Criteria Implementation Guidance...

Contents. Global Security Verification (GSV) Standard. Introduction... 2. The Global Security Verification Criteria Implementation Guidance... Global Security Verification (GSV) Standard Contents Introduction.................................... 2 The Global Security Verification Criteria Implementation Guidance......................................

More information

Security Guidelines for. Agricultural distributors

Security Guidelines for. Agricultural distributors Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint

More information

FSIS Security Guidelines for Food Processors

FSIS Security Guidelines for Food Processors United States Department of Agriculture Food Safety and Inspection Service FSIS Security Guidelines for Food Processors Food Security Plan Management Dear Establishment Owner/Operator: The Food Safety

More information

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

Warehouse Security Tips

Warehouse Security Tips Warehouse Security Tips an e Book from RSI Insurance Brokers to Help Prevent Cargo Loss www.rsiinsurancebrokers.com/warehousesecurity Toll Free (800) 828 5273 Email: info@rsi ins.com TABLE OF CONTENTS:

More information

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants Adapted from information provided by the U.S. Department of Agriculture Food Safety and Inspection Service GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants March 2008 BY COMPLETING PAGE

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No:

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No: ISLE OF PALMS POLICE DEPARTMENT Thomas E. Buckhannon, III, Chief of Police 30 J. C. Long Boulevard Isle of Palms, South Carolina 29451 (843) 886-6522 BUSINESS SECURITY SURVEY Date: Business Name: Business

More information

Security Policies and Procedures

Security Policies and Procedures Security Policies and Procedures April 26, 2012 Kristen Whelan Transportation Consultant kwhelan@libertyint.com www.libertyint.com Customs-Trade Partnership Against Terrorism What is C-TPAT? CBP and Industry

More information

LOSS PREVENTION IAT GROUP

LOSS PREVENTION IAT GROUP LOSS PREVENTION IAT GROUP CARGO SECURITY AND LOSS PREVENTION Introduction Cargo protection requires thorough planning to be effective and remain effective through changing conditions. Cargo security is

More information

Does a fence or other type physical barrier define the perimeter of the facility?

Does a fence or other type physical barrier define the perimeter of the facility? PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier

More information

PHYSICAL SECURITY STANDARDS

PHYSICAL SECURITY STANDARDS (T.D. 72-56) Department of the Treasury--Office of the Secretary Standards for security of international cargo There are published below for information of the public recommended physical and procedural

More information

Commercial or Business Security Survey

Commercial or Business Security Survey Exterior Grounds Commercial or Business Security Survey Is there a fence around the property or a clear definition of Territoriality? If there is a fence, is it tall enough and maintained in good repair?

More information

Key Small Parcel Requirements

Key Small Parcel Requirements Key RECIPIENT INFORMATION Enter the KLX facility address or destination location. PACKAGE WEIGHT & SIZE Individual package weight up to 150 lbs. (pounds) Maximum dimensions 180 in length, 165 in length

More information

Upon completion of the module, you will be issued an electronic training certificate.

Upon completion of the module, you will be issued an electronic training certificate. Introduction The US Department of Transportation mandates security awareness training as part of their security requirements found in Subpart I of Part 172 of the Hazardous Materials Regulations. The requirement

More information

TSR2014 TRUCKING SECURITY REQUIREMENTS. Transported Asset Protection Association. All rights reserved.

TSR2014 TRUCKING SECURITY REQUIREMENTS. Transported Asset Protection Association. All rights reserved. TSR2014 TRUCKING SECURITY REQUIREMENTS About TAPA Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics service providers. The

More information

INTERAGENCY COMMITTEE FOR AVIATION POLICY GUIDE FOR THE CONDUCT OF AVIATION RESOURCE MANAGEMENT SURVEYS

INTERAGENCY COMMITTEE FOR AVIATION POLICY GUIDE FOR THE CONDUCT OF AVIATION RESOURCE MANAGEMENT SURVEYS Attachment 1 APHIS Directive 1650.2 APHIS Aviation Security Program 2/28/06 INTERAGENCY COMMITTEE FOR AVIATION POLICY GUIDE FOR THE CONDUCT OF AVIATION RESOURCE MANAGEMENT SURVEYS (PHYSICAL SECURITY) CHECKLIST

More information

Motor Truck Cargo Insurance Application

Motor Truck Cargo Insurance Application Motor Truck Cargo Insurance Application Named Insured: Mailing Address: Policy period or date policy is to be in effect: Business is: Corporation Partnership Sole Owner Established in 19 For whom does

More information

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities 6 June 2012 INTRODUCTION Today s global corporations frequently outsource various

More information

SAFETY AND ENVIRONMENTAL INFORMATION FOR EXTERNAL COMPANIES. Koehler Kehl

SAFETY AND ENVIRONMENTAL INFORMATION FOR EXTERNAL COMPANIES. Koehler Kehl 1. Delivery, Notice, Signature After receiving the following information sheets, the team leader from every external company is required to read through them, explain them to their employees, and after

More information

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.

More information

AEO Template Introduction

AEO Template Introduction AEO Template Introduction WCO Members recognize that global consistency of the approval process and enhanced benefits are essential to encouraging broad trade participation and realization of the mutual

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

STCC Contractor/Vendor Rules and Regulations

STCC Contractor/Vendor Rules and Regulations STCC Contractor/Vendor Rules and Regulations STCC maintains specific rules and regulations that apply to all contractors and vendors who perform work or provide services. It is the responsibility of the

More information

Seals Security & Best Practices

Seals Security & Best Practices Seals Security & Best Practices Presented by Raymond Monzon Supply Chain Security Specialist Miami C-TPAT Field Office What Will Be Covered Intro This presentation will cover: C-TPAT Criteria ISO Seals

More information

Rail Carrier Security Criteria

Rail Carrier Security Criteria Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers

More information

Cargo Theft Prevention and Risk Mitigation for the Holiday Season

Cargo Theft Prevention and Risk Mitigation for the Holiday Season Hanover Risk Solutions Cargo Theft Prevention and Risk Mitigation for the Holiday Season As the holiday season approaches, manufacturers warehouses are packed to capacity as high-season inventory begins

More information

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0 MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:

More information

Kroger Manufacturing Trailer Seal Policy Revised 09/03/10

Kroger Manufacturing Trailer Seal Policy Revised 09/03/10 Kroger Manufacturing Trailer Seal Policy Revised 09/03/10 1 Inbound Supplier After the product is loaded and the trailer doors are closed, the supplier (or shipping warehouse) is responsible for affixing

More information

Developing a Security Training and Awareness Program

Developing a Security Training and Awareness Program Developing a Security Training and Awareness Program Text Slide DEVELOPING AND ENHANCING SECURITY TRAINING AND AWARENESS PROGRAMS One Way of Enhancing Supply Chain Security Efficiency is Through Security

More information

INTERNATIONAL BUSINESS

INTERNATIONAL BUSINESS INTERNATIONAL BUSINESS PART 4: FREIGHT FORWARDING TABLE OF CONTENTS PAGE INTRODUCTION TO FREIGHT HANDLING AND FORWARDING... 2 CATEGORIES OF FREIGHT... 3 HOW FREIGHT PRICING IS DETERMINED... 4 CARGO INSURANCE...

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

US CUSTOMS IMPORT DOCUMENT REQUIREMENTS

US CUSTOMS IMPORT DOCUMENT REQUIREMENTS US CUSTOMS IMPORT DOCUMET REQUIREMETS A. IVOICE Invoice should be billed to the Accounts Payable location. The Federal-Mogul location receiving the product must be listed as the Consignee. Supplier must

More information

Current as of 11/10/08 1 of 1

Current as of 11/10/08 1 of 1 BEST PRACTICES STANDARDS FOR SCHOOLS UNDER CONSTRUCTION OR BEING PLANNED FOR CONSTRUCTION I. Site Layout A. School buildings shall be provided with a securable perimeter. A securable perimeter means that

More information

2. Employees must wear their ID tag at all times while on the premises.

2. Employees must wear their ID tag at all times while on the premises. 3. Physical Access Controls Access control must prevent unauthorized entry to facilities, maintain control of employees and visitors and protect company assets. There must be written and verifiable procedures

More information

348 Birch s Road North Bay, ON P1B 8Z4 (ph) 1-800-265-9370 (fax) 1-866-352-6740 FREIGHT LOSS AND DAMAGE CLAIMS PROCEDURE

348 Birch s Road North Bay, ON P1B 8Z4 (ph) 1-800-265-9370 (fax) 1-866-352-6740 FREIGHT LOSS AND DAMAGE CLAIMS PROCEDURE 348 Birch s Road North Bay, ON P1B 8Z4 (ph) 1-800-265-9370 (fax) 1-866-352-6740 FREIGHT LOSS AND DAMAGE CLAIMS PROCEDURE 1 TABLE OF CONTENTS Shipper s Responsibilities 3 Consignee Responsibilities 4 Salvage

More information

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) Appendix A -- Minimum Security Standards for Level Federal

More information

Threats, Risks and Possible solutions

Threats, Risks and Possible solutions Annex 2 Threats, Risks and Possible solutions This document provides a list of the most significant risks related to the AEO authorisation and monitoring process, and at the same time, it provides a list

More information

Barrington Hills Police Department

Barrington Hills Police Department Barrington Hills Police Department Home Security Checklist Use this as a guide as you check your home for safety measures. Boxes marked indicate areas where you could take action to improve your home s

More information

Appendix G. Security management plan

Appendix G. Security management plan Appendix G Security management plan Security Management Plan Prepared by: Kann Finch Group Project Energy Australia Belmore Park Zone 1- Sub-station component General Design Requirements The perimeter

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

How To Ensure Security At A Site Security Site

How To Ensure Security At A Site Security Site Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers

More information

Security and Data Center Overview

Security and Data Center Overview Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Sensor Sensibility Building the Business Case for Incorporating External Sensors as Part of Your Automatic Vehicle Location Solution

Sensor Sensibility Building the Business Case for Incorporating External Sensors as Part of Your Automatic Vehicle Location Solution Sensor Sensibility Building the Business Case for Incorporating External Sensors as Part of Your Automatic Vehicle Location Solution The Challenge When organizations invest in an AVL solution, it is most

More information

DAtA security. the protection Of your INfORMAtION. Is OuR prime DIREctIVE

DAtA security. the protection Of your INfORMAtION. Is OuR prime DIREctIVE DAtA security the protection Of your INfORMAtION Is OuR prime DIREctIVE OVERVIEW building security theft alarms point of entry interior & exterior closed-circuit camera monitoring impact-resistant windows

More information

CREATING YOUR SCHOOL FOOD DEFENSE PLAN

CREATING YOUR SCHOOL FOOD DEFENSE PLAN CREATING YOUR SCHOOL FOOD DEFENSE PLAN Why Build a School Food Defense Plan? Food defense is having measures in place to reduce the chances of someone intentionally contaminating the food used in your

More information

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template Security Tools Forms Physical Security Assessment Security Plan Template Traffic Control Plan Template 1 Physical Security Assessment (PSA) Date: I. PHYSICAL SECURITY ASSESSMENT (PSA): EXTERIOR OF THE

More information

How To Protect A Water System

How To Protect A Water System SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol

More information

How to Reduce Accidents and Insurance Claims For Transport and Logistics Operators

How to Reduce Accidents and Insurance Claims For Transport and Logistics Operators How to Reduce Accidents and Insurance Claims For Transport and Logistics Operators Laurence Jones Director Global Risk Assessment TT Club established expertise 1 Overview Analysis of the main causes of

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: 16 March 2010 Table of Contents Topic Introduction 1. Plan administration a. Plan management b. Roles and responsibilities c. Reporting procedures d. Self assessments

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Hazardous Materials Security Awareness

Hazardous Materials Security Awareness Hazardous Materials Security Awareness Security Awareness Objectives Provide employees with skills to: Identify hazardous materials (hazmat) security risks Improve transportation security Recognize and

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

A Self-Audit of Your Current Campus Security Systems

A Self-Audit of Your Current Campus Security Systems A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our

More information

Safety and Environmental Information for External Companies

Safety and Environmental Information for External Companies 1. Delivery, Notice, Signature After receiving the following information sheets, the team leader from every external company is required to read through them, explain them to their employees, and after

More information